Lack of security in the Wi-Fi link to the Parrot AR drone allows it to be blown out of the sky by telnetting in and killing the process.
Ryan Satterfield, who describes himself as an ethical hacker and runs consultancy Planetzuda.com, explains on his YouTube channel that the Parrot drone hack was demonstrated at DEF CON 23. …

Well the person who spent £300 on it might be a bit miffed. They may even go so far as to claim criminal damage, you never know.

I'd like to see them try - how are you going to prove that it was a hack that killed the thing and not a malfunction? Read the bash log? If you have THAT deep an access you can cook up all sorts of mischief that could be made to zap itself on reboot. You could even make it an intermittent problem so it'll drive you mad trying to fix the hardware.

How ANYONE in the 21st century can wilfully avoid, no, REMOVE, the most basic access control facilities to use on an unsecured link is a bit beyond me. That is simply irresponsible.

See time travel does exist

Re: See time travel does exist

I could have sworn the same thing. These drones are fundamentally useless unless you don't mind them crashing out the sky mid flight. I thought all these vulns were being discussed not long after they came out...

Re: See time travel does exist

Well it's a more elegant solution to privacy invasions than a shotgun

Nice to see that, between this and recent car, skateboard and IOT security SNAFUs, whilst we are building Skynet we are leaving plenty of backdoors for when the machines do rise. Should make John Connor's job a little easier.